Self-Service Single Sign-On

Self-Service Single Sign-On (SSO) provides business-to-business customers with the tools needed to delegate SSO setup to their enterprise customers. By delegating this task, you can streamline your onboarding process and grant customers more autonomy over their sign-on experience. You can also reduce the time and costs associated with managing SSO across your customer base. 

Self-Service SSO requires minimal configuration in your Auth0 tenant and provides your customers with a setup assistant that guides them through the enablement process. After a customer completes their setup, the SSO integration is automatically added to your tenant as an Enterprise connection.

Supported Providers

During the Early Access period, Self-Service SSO supports the following identity providers:

  • Okta Workforce Identity Cloud (using OIDC)

  • Entra ID

  • Google Workspace (using OIDC)

  • Keycloak

  • Microsoft Active Directory Federation Services (ADFS)

  • PingFederate

  • Generic OIDC

  • Generic SAML

How it works

Self-Service SSO uses the following components to delegate setup to your customers:

  • Self-service profile: Defines key elements of customer SSO implementations, such as the identity providers they can use for SSO and which user attributes they must capture, such as email.

  • Self-service access ticket: Grants customer admins access to the SSO setup assistant and sets specific details for their resulting SSO integration.

  • SSO setup assistant: Guides customer admins through the SSO setup process.

At a high level, the Self-Service SSO workflow includes the following tasks: 

  1. You (the Auth0 customer) create a self-service profile in your tenant using the Auth0 Dashboard or the Management API. 

  2. Using the Management API, you next create a self-service access ticket that allows customer admins to configure SSO. 

  3. You retrieve the ticket URL from the asset created in Step 2 and send this link to your customer admin.

  4. Your customer admin launches the SSO setup assistant and follows the steps provided to create an application with their identity provider. 

  5. A new Enterprise connection pointing to the customer’s application is added to your Auth0 tenant.

Workflow diagram for the Self-Service SSO feature.

Select the diagram for an expanded view.

Using Self-Service SSO

The sections below provide expanded steps for configuring a self-service profile and generating self-service access tickets to share with customer admins.

Create a self-service profile

You can create self-service profiles using the Auth0 Dashboard or the Management API. Self-service profiles are used to determine key elements of customer implementations, including:

  • Which identity providers customer admins can use for SSO.

  • Which user attributes they must capture through SSO, such as email or family name.

  • Branding options that customize the look and feel of the SSO setup assistant.

You can create multiple profiles as needed to accommodate different customers or segments.

To create a self-service profile on the Auth0 Dashboard:

  1. Navigate to Authentication > Enterprise and open the Self-Service SSO section. Then, select Create Profile.

  2. In the space provided, enter a name and optional description for the profile. Then, select Create.

  3. On the Settings tab, complete the sections below. After updating these sections, select Save.

    • Identity Providers: Enable one or more identity providers. In the SSO setup assistant, customer admins can select their preferred option from the list of enabled providers.

    • Branding: Provide a logo and primary color for the SSO setup assistant.

    • Custom Introduction: Modify or replace the default message as needed. This introduction text displays to customer admins on the landing page of the SSO setup assistant. Your messaging can include basic formatting options, such as bolding or hyperlinks, and is limited to 2000 characters.

  4. On the User Profile tab, add up to 20 user attributes that your customers should capture through SSO, such as email or family name. You can set each attribute as required or optional.

    • During the setup assistant flow, customer admins will be prompted to map these defined user attributes to their identity provider to ensure the necessary values are passed to Auth0.

Manage self-service access tickets

After creating at least one self-service profile, you can generate self-service access tickets using the Management API. Self-service access tickets serve two primary purposes:

  • Granting customer admins access to the SSO setup assistant, through which they can configure a new SSO connection or modify an existing connection.

  • Predefining key details and behaviors of new SSO connections your customer admins will configure, such as which applications or organizations will be enabled for the new connection.

Generate an access ticket

To generate a self-service access ticket:

  1. Retrieve the ID of the self-service profile you want to associate with the access ticket through the Retrieve Self-Service Profiles endpoint.

  2. Call the SSO Access Ticket endpoint using the ID of the appropriate self-service profile:

POST  /api/v2/self-service-profiles/{id}/sso-ticket

In the request body, specify the parameters described in the table below.

Parameter Description
connection_id String.

Provide this option when generating an access ticket for updating an existing SSO connection.

ID for the connection a customer admin will update through the SSO setup assistant. Customer admins can modify the SAML certificate or the OIDC ID or secret for the associated connection.

Connection IDs can be retrieved through the Authentication section of the Auth0 Dashboard or the Get All Connections endpoint.

connection_id cannot be used in tandem with connection_config.
connection_config Object.

Provide this option when generating an access ticket for creating a new SSO connection. Customer admins will be able to modify key elements of the connection, such as the SAML certificate or OIDC ID or secret.

connection_config cannot be used in tandem with connection_id.
connection_config.name String. Maximum length is 128.

Name for the connection created through the SSO setup assistant.

This parameter is required when using connection_config.
connection_config.display_name String. Maximum length is 128.

User-friendly name for the connection created through the SSO setup assistant. This name displays on Universal Login prompts.

This parameter is optional when using connection_config.
connection_config.is_domain_connection Boolean.

Set to true if the connection is at the domain level.

This parameter is optional when using connection_config.
connection_config.show_as_button Boolean.

When true, the connection displays as an authentication option on your application's login screen.

This parameter is optional when using connection_config.
connection_config.metadata Object[].

Metadata associated with the resulting connection. Object can contain up to 10 key-value pairs. String values limited to 255 characters.

This parameter is optional when using connection_config.
connection_config.options Object[].

Options for the resulting connection, including icon_url and domain_aliases[].

This parameter is optional when using connection_config.
enabled_clients String[].

A list of application client IDs to associate with the SSO connection.
enabled_organizations Object[].

A list of organizations to associate with the SSO connection.
enabled_organizations[].organization_id ID of a specific organization to associate with the SSO connection.

You can retrieve IDs through the Organizations section of the Auth0 Dashboard, the Get Organizations endpoint, or the Get Organization by Name endpoint.

This parameter is required when using enabled_organizations.
enabled_organizations[].assign_membership_on_login Boolean.

When true, users who log in with the associated connection are automatically granted membership to the specified organization.

This parameter is optional when using enabled_organizations.
enabled_organizations[].show_as_button Boolean.

When true, the associated connection displays as an authentication option on the Organization login screen for your application. This can only be enabled for Enterprise connections.

This parameter is optional when using enabled_organizations.
ttl_sec Number.

Number of seconds for which the access ticket remains valid before expiration. If unspecified or set to 0, the value defaults to 432000 (which equals 5 days).

Example Request Body

{
    "connection_config": {
        "name": "string",
        "display_name": "string",
        "is_domain_connection": true,
        "show_as_button": true,
        "metadata": {
            "key1": "value1",
            "key2": "value2"
        },
        "options": {
            "icon_url": "string",
            "domain_aliases": [
                "acme.corp",
                "okta.com"
            ]
        }
    },
    "enabled_clients": [
        "string"
    ],
    "enabled_organizations": [
        {
            "organization_id": "string",
            "assign_membership_on_login": true,
            "show_as_button": true
        }
    ],
    "ttl_sec": 0
}

Was this helpful?

/

In response, you receive a URL to the self-service access ticket:

{
  "ticket": "https://{domain}/self-service/connections-flow?ticket={id}"
}

Was this helpful?

/

After you receive the ticket URL, share the link with your customer admin to grant them access to the SSO setup assistant. The setup assistant will then guide them through configuring the SSO connection.

You can wrap access ticket generation in your own self-service portal or send ticket URLs directly to customer admins through email, chat, or other communication channels.

Revoke an access ticket

By default, an access ticket URL remains valid for five days. Upon accessing the URL, a customer admin has five hours to complete their setup. If needed, you can revoke an access ticket prior to its expiration. For example, if an access ticket is shared with the wrong audience, you can revoke the ticket to prevent unauthorized access to the SSO setup assistant.

When an access ticket is revoked, its URL immediately becomes invalid, and any associated sessions are terminated. Customer admins with the URL will no longer be able to access the SSO setup assistant. A new access ticket can then be generated and shared as needed.

To revoke an access ticket:

  1. Retrieve the ID of the self-service profile associated with the access ticket using the Retrieve Self-Service Profiles endpoint.

  2. Locate the ID of the access ticket you wish to revoke. IDs can be found at the end of the access ticket URL.

  3. Call the Revoke SSO Access Ticket endpoint using the appropriate IDs:

POST  /api/v2/self-service-profiles/{id}/sso-ticket/{id}/revoke

In response, a 202 Accepted is returned.

References

APIs

To manage Self-Service SSO, the following Management API endpoints are available:

Rate Limits

When using Self-Service SSO, the following rate limits apply:

Description Endpoint Limits
Manage SSO profiles /api/v2/self-service-profiles Review the Management API rate limits for your subscription type.
Create an access ticket /api/v2/self-service-profiles/{id}/sso-ticket Review the Management API rate limits for your subscription type.
Consume an access ticket /self-service/connection-flows?ticket={id} 6 / min / IP
Load the webapp (including setup assistant) and webapp endpoints /self-service/* 50 / min / IP
90 / min / tenant